Under active development Content is continuously updated and improved
Home / Frameworks / ITSG-33 / CP — Contingency Planning

CP Contingency Planning

54 controls in the Contingency Planning family

CP-1Contingency Planning Policy And Procedures
CP-2Contingency Plan
CP-2(1)Contingency Plan
CP-2(2)Contingency Plan
CP-2(3)Contingency Plan
CP-2(4)Contingency Plan
CP-2(5)Contingency Plan
CP-2(6)Contingency Plan
CP-2(7)Contingency Plan
CP-2(8)Contingency Plan
CP-3Contingency Training
CP-3(1)Contingency Training
CP-3(2)Contingency Training
CP-4Contingency Plan Testing And Exercises
CP-4(1)Contingency Plan Testing And Exercises
CP-4(2)Contingency Plan Testing And Exercises
CP-4(3)Contingency Plan Testing And Exercises
CP-4(4)Contingency Plan Testing And Exercises
CP-5Contingency Plan Update
CP-6Alternate Storage Site
CP-6(1)Alternate Storage Site
CP-6(2)Alternate Storage Site
CP-6(3)Alternate Storage Site
CP-7Alternate Processing Site
CP-7(1)Alternate Processing Site
CP-7(2)Alternate Processing Site
CP-7(3)Alternate Processing Site
CP-7(4)Alternate Processing Site
CP-7(5)Alternate Processing Site
CP-7(6)Alternate Processing Site
CP-8Telecommunications Services
CP-8(1)Telecommunications Services
CP-8(2)Telecommunications Services
CP-8(3)Telecommunications Services
CP-8(4)Telecommunications Services
CP-8(5)Telecommunications Services
CP-9Information System Backup
CP-9(1)Information System Backup
CP-9(2)Information System Backup
CP-9(3)Information System Backup
CP-9(4)Information System Backup
CP-9(5)Information System Backup
CP-9(6)Information System Backup
CP-9(7)Information System Backup
CP-10Information System Recovery And Reconstitution
CP-10(1)Information System Recovery And Reconstitution
CP-10(2)Information System Recovery And Reconstitution
CP-10(3)Information System Recovery And Reconstitution
CP-10(4)Information System Recovery And Reconstitution
CP-10(5)Information System Recovery And Reconstitution
CP-10(6)Information System Recovery And Reconstitution
CP-11Alternate Communications Protocols
CP-12Safe Mode
CP-13Alternative Security Mechanisms